Try our new research platform with insights from 80,000+ expert users

ExtraHop Reveal(x) for IT Operations vs Splunk Enterprise Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 29, 2024
 

Categories and Ranking

ExtraHop Reveal(x) for IT O...
Ranking in IT Operations Analytics
13th
Average Rating
8.6
Reviews Sentiment
7.4
Number of Reviews
8
Ranking in other categories
Network Monitoring Software (59th), Network Diagnostics (6th), Network Packet Capture (2nd)
Splunk Enterprise Security
Ranking in IT Operations Analytics
1st
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
301
Ranking in other categories
Log Management (1st), Security Information and Event Management (SIEM) (1st)
 

Mindshare comparison

As of December 2024, in the IT Operations Analytics category, the mindshare of ExtraHop Reveal(x) for IT Operations is 3.3%, up from 2.4% compared to the previous year. The mindshare of Splunk Enterprise Security is 28.8%, down from 35.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
IT Operations Analytics
 

Featured Reviews

Out West - PeerSpot reviewer
Great for identifying application interdependencies with helpful support but needs better visualizations
We're just trying to identify the application interdependencies, which normally reside on different servers, including web servers, database servers, enterprise service bus, et cetera, up to your presentation layer before we start moving stuff around. Normally, the reason why we use these tools is to understand what assets we have, where they're deployed, and how they enter and operate before we decide to go move something from point A to point B. The solution is going to allow me to establish a wave or migration plan where you have different waves of migration and then you actually have move groups to try and get your application moved from A to B seamlessly. A to B could be on-premise to on-premise. It could be on-premise to cloud. Et cetera. The solution can tell me what components can I deploy, for example, into a cloud space, without having to refactor my applications since that can be quite time-consuming and costly.
Avinash Gopu. - PeerSpot reviewer
Offers good visibility into multiple environments, significantly reduces our alert volume, and speeds up our security investigations
There are limitations with Splunk not detecting all user activity, especially on mainframes and network devices. This is because Splunk relies on agents, which cannot access certain workstations. In these cases, we have to rely on application data. For example, with mainframes, manual reports are generated and sent to Splunk, limiting visibility to what's manually reported. This lack of automation for specific platforms needs improvement from Splunk. Additionally, API access is limited for other applications that rely on API calls and requests. This requires heavy customization on Splunk's end. These are the main challenges we've encountered. Monitoring multiple cloud platforms, like Azure, GCP, and AWS, with Splunk Enterprise Security presents some challenges. While Splunk provides different connectors for each provider, consolidating data from two domains across distinct cloud environments can be complex. However, leveraging pre-built templates and Splunk's data collation capabilities can help overcome these hurdles. Despite initial difficulties, I believe Splunk can effectively address this task, earning it an eight out of ten rating for its multi-cloud monitoring capabilities. While Splunk Enterprise Security offers insider threat detection capabilities, its effectiveness could be enhanced by integrating with additional tools, such as endpoint security solutions. This integrated approach is particularly crucial for financial institutions, which often require dedicated endpoint security teams. While using multiple tools is valuable, further improvements within Splunk itself are also necessary. Considering both external integration and internal development, I would rate its current insider threat detection capabilities as three out of ten. Threat detection is where Splunk falls behind. While it offers tools, other use cases require additional work. PAM is an enterprise tool that centralizes information about users, servers, and everything else. It needs real-time monitoring, which I haven't seen in any of the companies I've worked for. They only rely on Splunk for alerting, but real-time monitoring should be handled by the endpoint security team's tools. This means there's no detection or analysis at the machine or endpoint level. Additionally, threat analysis reporting is also absent.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This solution is more applications reference architecture focused. Its benefit is that it specializes in that space."
"There are many valuable features in this product, but probably the biggest is the customization capability it has."
"Not only can you look at the protocol import level. It also has a live PCAP analysis."
"Wire data analytics."
"The most valuable feature is the way it handles data, from Layer 2 up to Layer 7. We can see everything that happens in the network."
"The most valuable features are security detections, perimeter detection, dashboards, and alerts."
"Splunk has helped improve our company's resilience level."
"Easy to deploy and simple to use."
"The Splunk queries are valuable."
"We primarily use it to correlate logs throughout the enterprise for both searching and use in investigations."
"The data analysis part is good in Splunk, which is something that I like the most. It is also quite easy to use. Its dashboards, visualizations, and analytics are good."
"It is very simple to tweak or write a small piece of glue code to go ahead and create a new dashboard for a business unit to make near real-time decisions to focus more on other geographies when launching the product."
"The security part is useful as it helps secure the entire environment."
"The correlation capabilities are the first value that our clients say they like with Splunk."
 

Cons

"I would improve the Rule-Based Access Control (RBAC) by providing granular access control to the data."
"Network visibility is something that needs to be improved."
"We'd like to see a local presence within the region in order to have seamless service whether it's the support, the implementation, or professional services."
"They either have to go broad or decide what their bread and butter is and get really good at that."
"This solution would be improved if it had the ability to retain data longer."
"They have a new solution, ExtraHop Reveal(x), and I think it needs improvement."
"It would be nice if Splunk provided a little more documentation and instructions on how to upload. The steps are short, but sometimes it's not so intuitive."
"The user access control could be much more granular, so that the admins can control r/w/x access for specific features of the product like dashboards, etc."
"I want Splunk Enterprise Security to release more AI and machine learning features in the future."
"More control with Splunk Cloud as it seems a bit limited. I used to manage an on-premise instance of Splunk Enterprise and really liked having more control over it."
"It is a hugely complicated product."
"Many of my clients want to get better at Splunk, but they're afraid of using the tool because they feel it's too complex for them."
"The product's price may be an area of concern where improvements are required."
"The product is relatively expensive."
 

Pricing and Cost Advice

"The price of this solution for our environment is about £650,000 ($855,000 USD) for three years."
"The pricing is fair considering the value provided."
"The pricing is higher than other solutions, but with such good features, I think it's worth it."
"The license for Splunk Enterprise Security is expensive."
"From what I have seen so far, Splunk has multiple cost models. The one that we are using is pretty good when it comes to ingesting data into the environment. It has worked out pretty well."
"Luckily, we come under a large federal agency, and before the pandemic, they signed a large enterprise license agreement. It worked out great and to our advantage because we are a small organization. We got a 300 gig license, and we just did not have the buying power to be able to get products cheaply. Because we all partnered together under the agency umbrella, we were able to get Splunk Enterprise Security, UBA, and ITSI for cheap. This was good considering the fact that some of these premium apps require a minimum number of users, and we do not have the number of people needed to even justify buying it."
"ROI is estimated at saving my team roughly 10 to 12 man hours per week in troubleshooting for our company as well as what our profits had been from our services of installing, configuring, and supporting other clients with the product."
"It is a bit costly."
"Free Splunk license for PoCs on personal machines and the ability to scale the PoC to an enterprise level app."
"Splunk Enterprise Security is an expensive solution."
"I think we recently switched to the SVC pricing compared to the ingest pricing."
report
Use our free recommendation engine to learn which IT Operations Analytics solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Educational Organization
58%
Financial Services Firm
10%
Computer Software Company
5%
Manufacturing Company
3%
Financial Services Firm
15%
Computer Software Company
14%
Government
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about ExtraHop Reveal(x) for IT Operations?
This solution is more applications reference architecture focused. Its benefit is that it specializes in that space.
What needs improvement with ExtraHop Reveal(x) for IT Operations?
What they can improve would be building a broader reach in terms of capabilities. At the same time, there are other tools on the market that could augment their offering. They either have to go bro...
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingestion of anything, but the charge per GB/Day Indexed and it gets expensive as log ...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitoring information from different sources. Splunk is very good at alerting us if we...
 

Overview

 

Sample Customers

Alaska Airlines, bet365, Concur, McKesson, Microsoft, Morgan Stanley, Practice Fusion, Seattle Children's Hospital, Steward Health Care System
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about ExtraHop Reveal(x) for IT Operations vs. Splunk Enterprise Security and other solutions. Updated: December 2024.
824,053 professionals have used our research since 2012.